The Delay-Bandwidth Product “Keeping the pipe full” 1.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 14 Introduction to Computer Networks.
COS 461 Fall 1997 Data Link Layer u Today: LANs other than Ethernet –token rings –switched networks –cellular technology u remaining issues –error detection.
ECE358: Computer Networks Fall 2014
Protocol Strategies.
COMT Performance of Data Communications Protocols General Protocol Concepts.
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
8-Reliability and Channel Coding Dr. John P. Abraham Professor UTPA.
Transport Layer 3-1 Transport Layer r To learn about transport layer protocols in the Internet: m TCP: connection-oriented protocol m Reliability protocol.
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
The Data Link Layer Chapter 3. Position of the data-link layer.
Lecture Internet Overview: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching,
Lecture 2 Performance Metrics. Bandwidth Delay Bandwidth-delay product Latency Throughput.
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
CS3502: Data and Computer Networks DATA LINK LAYER - 2 WB version.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
Data Link Control Protocols
ARQ Mechanisms Rudra Dutta ECE/CSC Fall 2010, Section 001, 601.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 11 Data Link Control Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Data Link Layer We have now discussed the prevalent shared channel technologies  Ethernet/IEEE  Wireless LANs (802.11) We have now covered chapters.
Exercises. Problem 1 The link delay is 270ms. Each data frame is 1000 bits. Data rate is 1Mbps. What is the link efficiency of the Stop&Wait protocol?
Lesson 3—Networking BASICS1 Networking BASICS Network Design Unit 2 Lesson 3.
Computer Networks Performance Metrics. Performance Metrics Outline Generic Performance Metrics Network performance Measures Components of Hop and End-to-End.
TCP Lecture 13 November 13, TCP Background Transmission Control Protocol (TCP) TCP provides much of the functionality that IP lacks: reliable service.
COMT 4291 Performance of Data Communications Protocols General Protocol Concepts.
TELE202 Lecture 5 Packet switching in WAN 1 Lecturer Dr Z. Huang Overview ¥Last Lectures »C programming »Source: ¥This Lecture »Packet switching in Wide.
The Transmission Control Protocol (TCP) Application Services (Telnet, FTP, , WWW) Reliable Stream Transport (TCP) Connectionless Packet Delivery.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
CSC 311 Chapter Eight FLOW CONTROL TECHNIQUES. CSC 311 Chapter Eight How do we manage the large amount of data on the network? How do we react to a damaged.
Chapt 3 Data Link Layer1 Data Link Layer Functions –Provides services to network layer Well-defined interface –Framing –Flow control – between adjacent.
2000 년 11 월 20 일 전북대학교 분산처리실험실 TCP Flow Control (nagle’s algorithm) 오 남 호 분산 처리 실험실
CS 164: Slide Set 2: Chapter 1 -- Introduction (continued).
CS3505: DATA LINK LAYER. data link layer  phys. layer subject to errors; not reliable; and only moves information as bits, which alone are not meaningful.
Network Performance. Performance (1) What would be the characteristics of the ideal network? –It would be completely transparent in every conceivable.
Data Link and Flow Control Networks and Protocols Prepared by: TGK First Prepared on: Last Modified on: Quality checked by: Copyright 2009 Asia Pacific.
Chapter 24 Transport Control Protocol (TCP) Layer 4 protocol Responsible for reliable end-to-end transmission Provides illusion of reliable network to.
TCP: Transmission Control Protocol Part II : Protocol Mechanisms Computer Network System Sirak Kaewjamnong Semester 1st, 2004.
Queuing Delay 1. Access Delay Some protocols require a sender to “gain access” to the channel –The channel is shared and some time is used trying to determine.
Networks and Distributed Systems Sarah Diesburg Operating Systems COP 4610.
TCP continued. Discussion – TCP Throughput TCP will most likely generate the saw tooth type of traffic. – A rough estimate is that the congestion window.
CS 453 Computer Networks Lecture 11 Layer 2 – Data Link Layer Protocols.
CSCI 465 D ata Communications and Networks Lecture 10 Martin van Bommel CSCI 465 Data Communications & Networks 1.
Transmit Delay 1. The significant delay in the LAN Propagation delay is not the only type of delay –On a LAN the propagation delay is very small because.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Principles of reliable data transfer 0.
Transport Layer3-1 Chapter 3 outline r 3.1 Transport-layer services r 3.2 Multiplexing and demultiplexing r 3.3 Connectionless transport: UDP r 3.4 Principles.
Retransmission. Automatic Repeat reQuest (ARQ) 2 Time Packet ACK Timeout Automatic Repeat Request –Receiver sends acknowledgment (ACK) when it receives.
TCP as a Reliable Transport. How things can go wrong… Lost packets Corrupted packets Reordered packets …Malicious packets…
1 Direct Link Networks: Reliable Transmission Sections 2.5.
CSCI 465 D ata Communications and Networks Lecture 11 Martin van Bommel CSCI 465 Data Communications & Networks 1.
1 Ram Dantu University of North Texas, Practical Networking.
Data Communication Networks Lec 13 and 14. Network Core- Packet Switching.
1 The utopia protocol  Unrealistic assumptions: –processing time ignored –infinite buffer space available –simplex: data transmitted in one direction.
Computer Networking Lecture 16 – Reliable Transport.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
Data and Computer Communications Digital Data Communications Techniques + Error Control+ Digital Data Communications Techniques + Error Control+Multiplexing.
Chapter 3: The Data Link Layer –to achieve reliable, efficient communication between two physically connected machines. –Design issues: services interface.
CSMA/CD Carrier sense multiple access with collision detection (CSMA/CD) is a media access control method used most notably in early Ethernet technology.
Computer Communication & Networks
Reliable Transmission
MODULE I NETWORKING CONCEPTS.
DIGITAL DATA COMMUNICATION TECHNIQUES
Precept 2: TCP Congestion Control Review
Asynchronous Serial Communications
The Medium Access Control Sublayer
CS4470 Computer Networking Protocols
Data Communication Networks
DATA COMMUNICATION Lecture-38.
A simple network connecting two machines
Getting Connected (Chapter 2 Part 3)
Error detection: Outline
Presentation transcript:

The Delay-Bandwidth Product “Keeping the pipe full” 1

Effective Data Rate The nominal data rate determines the transmit time for a frame or other atomic unit of transmission –But users measure the performance of their applications and essentially compute their own effective data rate If the network is idle between frames then clearly the application will not have an effective data rate close to the nominal data rate –This was illustrated to some extent with the gaps created by access delay, or even the increased interval between frames that might result from queuing 2

The problem For a protocol to roughly achieve the nominal data rate of the slowest link it traverses it must “keep the pipe full” on that slowest link –It must avoid creating time gaps when the network is idle –This can be a problem for protocols that depend on feedback to continue Suppose we send 1500 bytes and wait for a 100 byte acknowledgement (ACK) in order to send more data (a simple, reliable protocol) –Consider LAN and WAN example networks with some typical characteristics 3

LAN and WAN examples 4

Notional diagram for the WAN 5

It hurts when I do that… Then don’t do that! This “Stop and Wait” reliable protocol is not a good choice for a WAN –Other reliable protocols buffer the data they send so that then can resend data if no ACK is received – but in the mean time they can keep sending while waiting for ACKs How much data does the sender need to buffer? –It must buffer each bit of data while waiting for the ACK for that data to return –All the additional data sent while waiting for the first ACK must also be buffered to wait for its respective ACK –The answer is the “delay-bandwidth product” This is actually the “delay-data-rate product” 6

The WAN example with the pipe full 7

Delay Data-rate Product The round-trip delay is the time it takes between sending some data and receiving its ACK Divide that delay by the duration of a bit and we would have the number of bits that could be sent during that delay period –But the duration of a bit is the inverse of the data rate –So multiply by the data rate instead of dividing by the bit duration 8

Summary The round-trip delay times the data rate of the slowest link is the amount of data that must be “in- flight” or “on-the-wire” to avoid idle time while waiting for an ACK –Sometimes the one-way delay is used to compute a one- way delay-bandwidth product –In the WAN situations where delay bandwidth product is significant it is usually “good enough” to just use the propagation delay and then double or triple the result to deal with the potential for queuing delay, etc. –We will see in another lesson that bandwidth and data rate are often numerically similar 9